The Network Software Book 2011

The Network Software Book 2011

The Network Software book 2011 Fredrik Abbors, Thomas Forss, Alonso Gragera, Petri Heinonen, Nico Hållfast, Niclas Jern, Miikka Kaarto, Tony Karlsson, Md. Nazmul Haque Khan, Jessica Laukkanen, Andres Ledesma, Sushil Pandey, Alexander Pchelintsev, Joacim Päivärinne, Fredrik Rantala, Haider Raza, Gema Román, Sumreen Mohsin Saleemi, Björn Sjölund, Kasper Välimäki, Frank Wickström, Maria Yanchuk, Guopeng Yu, Carlo Zambon Preface In this collection we have gathered the papers written by the participants to the Network Software course held during January-May 2011 at Åbo Akademi University, Department of Information Technologies. The students had to choose and research a topic related to the course theme, write a paper about it, get the paper reviewed by their colleagues and present the paper in class. This year’s course was a great success, with 24 students finishing the course: six Computer Science students, ten Computer Technology students, three Information Systems students and five exchange students. The range of topics was very broad, from social networks and virtual worlds to home networking, private smart spaces, cloud and grid computing, fault tolerance, performance testing, security, context awareness, zigbee systems, IPv6, Host Identity Protocol, location privacy, load balancing, RIA architectures, Wi-Fi location awareness, energy-awareness, CRC, microchip implantations in animals and last but not at all least, public key cryptography (RSA) and quantum cryptography. The order of the papers in this collection is not thematic; instead, we have kept the order in which the students registered to work on their papers. Enjoy the papers! Luigia Petre Turku, June 20, 2011 Petter Sandvik http://www.users.abo.fi/lpetre/netsoft11/ Table of Contents Nico Hållfast ................................................. Grid Computing versus Cloud Computing Maria Yanchuk...............................................Home Networking: the Smart House Concept Alonso Gragera..............................................Quantum Cryptography on Computer Networks Sushil Pandey.................................................Security Issues in Wireless Communications Tony Karlsson.................................................Fault Tolerance Methods for Ethernet Networks Gema Román.................................................The Networking Behind Facebook Carlo Zambon.................................................Public-key cryptography and the RSA Algorithm Fredrik Abbors...............................................Software Performance Testing in the Cloud Frank Wickström........................................... The ZigBee Technology and its Applicability Sumreen Mohsin Saleemi..............................Personal Smart Spaces: Future Vision and Services Fredrik Rantala..............................................CRC - Cyclic Redundancy Checking Alexander Pchelintsev...................................IPv6 Jessica Laukkanen.........................................Context-Aware Systems Thomas Forss................................................Load Balancing Andres Ledesma............................................Virtual Worlds Petri Heinonen..............................................Introduction to Rich Internet Application Architectures Md. Nazmul Haque Khan..............................An overview of Network Security and Cryptography Miikka Kaarto...............................................Security in Cloud Computing Björn Sjölund................................................Indoor Location Aware Computing Using Wi-Fi Networks Niclas Jern....................................................Location Privacy Joacim Päivärinne........................................Online Social Networks Haider Raza..................................................Host Identity Protocol (HIP) Guopeng Yu.................................................Energy-Aware Networking Kasper Välimäki...........................................Microchip Implantations in Animals 1 Grid Computing versus Cloud Computing Nico Hallfast˚ Network Software Abo˚ Akademi, Turku, Finland [email protected] Abstract—Grid computing is a technology which can computing paradigms, we compare the architecture provide large computing resources over a network. and features of the two as well as security, A technology very similar to grid computing, cloud software development and practical applications. In computing, is also able to provide the end-user with a the concluding section, Section V, we will discuss vast amount of computing resources. Due to the rising popularity of cloud computing, its definition has become our findings. very vague; therefore, a clear distinction between grid computing and cloud computing may be hard to find. In II. WHAT IS GRID COMPUTING? this paper we provide the reader with clear definitions of grid computing and cloud computing, as well as We understand the word grid to be a network provide examples of when to use each of these computing of horizontal and vertical bars sometimes used paradigms. We compare grid and cloud computing with as a base to build something on, and sometimes each other in order to uncover a better understanding of the advantages and disadvantages of these technologies. used to connect several things to each other. Grid computing could then be understood as having a Index Terms—grid computing, cloud computing, saas, close relation to our assumptions of the word grid. distributed computing Indeed sometimes grid computing is simply referred to as the Grid [4]. I. INTRODUCTION Grid computing has its origins in the USA LOUD computing has been a buzzword in the in the early 1990s, when efforts were made to C IT-community for a few years. It has been connect several supercomputers together to provide said to change the way we use computers since it testbeds for scientifical use. These testbeds were lets the user control great amounts of computing not yet defined as being a grid, but instead power without the user having to invest in the these interconnected supercomputers were called hardware itself [1]. Another distributed computing metasystems and metacomputers [5]. The National paradigm, grid computing, also lets the user control Technology Grid, founded in 1997, was the first almost supercomputer-like computing power [2], computer system that was defined as being a [3]. Due to the rising popularity of cloud computing, grid of computers. The founders of the National the definition of it has been hard to find. Cloud Technology Grid, the National Science Foundation, computing has in some instances been mixed up thought of the grid as being “a name derived from with grid computing, in some discussions cloud the notion of the electrical power grid” [5]. computing and grid computing have even been In 1998 the Global Grid Forum was founded with claimed to be the same computing paradigm [1]. the goal of creating open standards for grids [6]. The In this paper we will give clear definitions of both Global Grid Forum also defined a computational grid computing and cloud computing. We will also grid as “a hardware and software infrastructure compare the two computing paradigms in order to that provides dependable, consistent, pervasive, create a better understanding of what grid or cloud and inexpensive access to high-end computational computing truly is. We will achieve this by first capabilities”. This definition was based on a giving definitions of both grid computing and cloud three point checklist given by Foster [4]. This computing. This is done in Sections II and III. In checklist proposed three characteristics that should Section IV we will focus on comparing the two be achieved by a grid: 2 1) A grid coordinates resources that are not subject to centralized control. 2) A grid uses standard, open, general-purpose protocols and interfaces. 3) A grid delivers nontrivial qualities of service. The checklist given by Foster has since been updated [5] in order to provide a more Figure 1. The different layers of cloud computing. SaaS includes comprehensive grid definition: “A grid can be the software that is provided to the end user, while utility computing defined as a large-scale geographically distributed includes the hardware that runs the software. hardware and software infra-structure composed of heterogeneous networked resources owned and IV. COMPARISON shared by multiple administrative organizations In this section we compare cloud computing which are coordinated to provide transparent, and grid computing from several perspectives. In dependable, pervasive and consistent computing Section IV.A we focus on the architecture of the support to a wide range of applications. These two computing paradigms, in Section IV.B we applications can perform either distributed study their security aspects, in Section IV.C we computing, high throughput computing, on-demand discuss software development and in Section IV.D computing, data-intensive computing, collaborative we outline their practical applications. computing or multimedia computing.” Grids are typically used for executing a job. A job A. Architecture and features is defined as being a program that is executed at an appropriate point on the grid. The jobs may compute As described in Section II, one of the first grid something, execute one or more system commands, computing platforms was designed by connecting move or collect data, or operate machinery [3]. several supercomputers together, in order to form Depending on the job and grid type, there may be a one big metacomputer. Therefore,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    124 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us